Feeds

Networked radar barrage balloons pass milestone

Poor man's defence against poor man's missile

Beginner's guide to SSL certificates

US-based weapons globocorp Raytheon was pleased yesterday to announce a successful Critical Design Review for its planned flotilla of cruise-missile-busting network spyeye barrage balloons.

Raytheon prefer to call the digital blimp barrier system JLENS, for Joint Land attack cruise missile defense Elevated Netted Sensor system. The idea is to put radars and communications gear high in the sky aboard moored aerostats. This will allow the sensors to peer down and spot low-flying enemies - such as cruise missiles - while they are still below the horizon for normal groundbound radars. The comms would also provide line-of-sight over much larger areas, offering improved network bandwidth for US ground force in the balloons' footprint.

Apparently the US Army, sponsors of the JLENS idea, are chuffed as can be.

"JLENS is moving forward," said Lt Col Stephen Willhelm of the US Army Program Executive Office for Missiles and Space. "The JLENS design review ... reaffirms our continued confidence that this critical cruise missile defense capability is on track."

Elements of the US military are concerned about the worldwide proliferation of low-flying, cruise missile type threats - perhaps as basic as a suicide-piloted light aircraft stuffed with homemade explosives. There are already ways to defend against these - for instance an AWACS radar plane can detect such targets from afar, and US fighters can then easily destroy them. But AWACS and fighters are pricey, even more so when you consider their limited endurance and the need to provide a large fleet in order to guarantee continued airborne watch. By contrast, JLENS balloons are cheap and can stay up for thirty days at a stretch.

In addition to comms and detection of cruise missiles, Raytheon say that the JLENS balloon-radars will be able to track ground targets just as airborne roboplanes and surveillance craft can. The company even suggests that JLENS will be able to track bigger artillery munitions - such as "large caliber rockets" - in flight.

The balloons themselves won't be armed, though one type will carry a fire-control radar. Rather, they will pass targeting information to other weapon systems such as Patriot missile batteries.

India has already deployed Israeli-made aerostat radars, in order to guard against possible low-flying air raids by the Tamil Tiger improvised rebel air force in Sri Lanka. ®

Internet Security Threat Report 2014

More from The Register

next story
GRAV WAVE DRAMA: 'Big Bang echo' may have been grit on the scanner – boffins
Exit Planet Dust on faster-than-light expansion of universe
SpaceX Dragon cargo truck flies 3D printer to ISS: Clawdown in 3, 2...
Craft berths at space station with supplies, experiments, toys
That glass of water you just drank? It was OLDER than the SUN
One MEELLION years older. Some of it anyway
Big dinosaur wowed females with its ENORMOUS HOOTER
That's right, Doris, I've got biggest snout in the prehistoric world
Japanese volcano eruption reportedly leaves 31 people presumed dead
Hopes fade of finding survivors on Mount Ontake
Relive the death of Earth over and over again in Extinction Game
Apocalypse now, and tomorrow, and the next day, and the day after that ...
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.